£400 Per day
Inside
Remote
London, England, United Kingdom
Summary: The SOC Analyst role requires an individual with Active SC Clearance to support a critical program within a well-known consultancy. The position focuses on leveraging expertise in cloud technologies and incident response to ensure compliance with relevant regulations. Strong communication skills are essential for translating complex technical information to non-technical stakeholders. The role is primarily remote and offers a competitive daily rate.
Key Responsibilities:
- Work as a SOC Analyst in large, complex organizations.
- Ensure compliance with regulations and control frameworks.
- Utilize strong knowledge of cloud technologies including AWS and Azure.
- Conduct incident response, investigation, analysis, logging, and reporting.
- Liaise with GRC teams to maintain adherence to relevant standards.
- Translate complex technical threats to non-technical audiences.
Key Skills:
- Proven commercial experience as a SOC Analyst.
- Active SC clearance.
- Strong working knowledge of cloud technologies (AWS, Azure).
- Knowledge of adversary TTPs and frameworks like MITRE ATT&CK.
- Strong incident response and analysis skills.
- Excellent communication and stakeholder management skills.
- GIAC Certified Incident Handler (GCIH) Certification or similar (nice to have).
- Immediate availability.
Salary (Rate): £400.00/daily
City: London
Country: United Kingdom
Working Arrangements: remote
IR35 Status: inside IR35
Seniority Level: Mid-Level
Industry: IT
SOC Analyst - Active SC, Cyber, Cloud
Up to £400 per day - Inside IR35
Primarily Remote
6 months
My client is an instantly recognisable consultancy who require a SOC Analyst with Active SC Clearance to join a business-critical programme.
Key Requirements:
Proven commercial experience working as a SOC Analyst in large, complex organisations.
Active SC clearance.
Strong working knowledge of cloud technologies including AWS and Azure.
The ability to liaise with GRC teams to ensure compliance with and company adherence to relevant regulations and control frameworks e.g. NCSC CAF, ONR SyAPs, ISO27001.
Proven knowledge of adversary TTPs and frameworks like MITRE ATT&CK.
Strong incident response, investigation, analysis, logging and reporting skills.
Excellent communication and stakeholder management skills with the ability to translate complex technical threats and attack paths to non-technical audiences.
Nice to have: GIAC Certified Incident Handler (GCIH) Certification or similar.
Immediate availability.
Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at hays.co.uk